scispace - formally typeset
Open AccessJournal ArticleDOI

Voronoi-based image representation applied to binary visual cryptography

TLDR
The proposed Voronoi-based Visual Cryptography (VVC) technique permits to drastically reduce the amount of encoded and transmitted information by comparison with a traditional VC scheme.
Abstract
A common processing scheme of Visual Cryptography (VC) consists of generating two ciphered images from a secret image. The sender transmits these key images via two different channels. The receiver collects the key images and recovers the secret image by superimposing them. In this article, Voronoi tessellation is exploited in Visual Cryptography for the first time to the best of our knowledge. The proposed Voronoi-based Visual Cryptography (VVC) technique permits to drastically reduce the amount of encoded and transmitted information by comparison with a traditional VC scheme. Hence, the technique can be used for transmissions of secret images with enforcement of the transmission reliability by enhancing the redundancy of information or with communication networks and technologies having low bandwidth and memory. Moreover, the random arrangement of the Voronoi polygons makes the transmission of the secret image more secure since the sender and the recipient use a private generator of random points. In addition, shape reconstruction properties of the image-based Voronoi representation are stated.

read more

Citations
More filters
Journal ArticleDOI

Voronoi cell analysis: The shapes of particle systems

TL;DR: Voronoi tessellations, originally introduced to study problems in pure mathematics, have become a powerful and versatile tool for analyzing various problems in physics as mentioned in this paper , and can be used to characterize many physical systems.
Journal ArticleDOI

The Methodology of Creating Variable Resolution Maps Based on the Example of Passability Maps

TL;DR: The conducted research demonstrated that variable resolution passability maps may successfully replace maps that consist of sometimes several dozen times higher numbers of primary fields, which enables reducing the amount of data stored in computer memory and shortens the time necessary to access visualization and information analysis onpassability maps.
Journal ArticleDOI

Secure Online Voting System using Visual Cryptography

TL;DR: In this paper, a secure online voting system using visual cryptography is proposed, where visual information can be encrypted on the user side, with the information decrypted on the admin side, which can be helpful in allowing participation in voting systems securely and ensuring fast vote counting and monitoring of the voting process.
Journal ArticleDOI

Multiple color image encryption based on cascaded quaternion gyrator transforms

TL;DR: Wang et al. as mentioned in this paper proposed a novel encryption algorithm using cascaded quaternion gyrator transforms that allows protecting multiple color images with efficiency at once. But the originality is reflected in the integration of quaternions algebra with a cascaded encryption structure.
Proceedings ArticleDOI

Design and Implementation of Lightweight Manmachine Terminal Screen Interactive Client

TL;DR: In this article, a lightweight human-machine terminal display architecture is proposed to realize the display of electrical primitives, chart primitives and non-viewable primitives on lightweight man-machine terminals.
References
More filters
Journal ArticleDOI

Distance transformations in digital images

TL;DR: Six different distance transformations, both old and new, are used for a few different applications, which show both that the choice of distance transformation is important, and that any of the six transformations may be the right choice.

Visual Cryptography

Moni Naor, +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Journal ArticleDOI

Secret image sharing

TL;DR: A method such that a secret image is shared by n shadow images, and any r shadow images of them can be used to restore the whole secret image, and the size of each shadow image is smaller than the secret image in this method.
Journal ArticleDOI

Visual cryptography for color images

TL;DR: Three methods for visual cryptography of gray-level and color images based on past studies in black-and-white visual cryptography, the halftone technology, and the color decomposition method are proposed.
Journal ArticleDOI

Extended capabilities for visual cryptography

TL;DR: An extended visual cryptography scheme, for an access structure (ΓQual,ΓForb) on a set of n participants, is a technique to encode n images in such a way that when the authors stack together the transparencies associated to participants in any set X∈�Qual they get the secret message with no trace of the original images, but any X∈Γ forb has no information on the shared image.
Related Papers (5)
Trending Questions (1)
How can Voronoi voxels be used in various applications such as image processing, computer graphics, and data visualization?

The provided paper does not discuss the use of Voronoi voxels in various applications such as image processing, computer graphics, and data visualization.